Search results for "ad hoc networks"

showing 10 items of 10 documents

A Hierarchical Detection and Response System to Enhance Security Against Lethal Cyber-Attacks in UAV Networks

2018

International audience; Unmanned aerial vehicles (UAVs) networks have not yet received considerable research attention. Specifically, security issues are a major concern because such networks, which carry vital information, are prone to various attacks. In this paper, we design and implement a novel intrusion detection and response scheme, which operates at the UAV and ground station levels, to detect malicious anomalies that threaten the network. In this scheme, a set of detection and response techniques are proposed to monitor the UAV behaviors and categorize them into the appropriate list (normal, abnormal, suspect, and malicious) according to the detected cyber-attack. We focus on the m…

Ad hoc networksMonitoringAnomaly-based intrusion detection systemWireless ad hoc networkComputer science[ INFO.INFO-NI ] Computer Science [cs]/Networking and Internet Architecture [cs.NI]UAVMobile computing[ INFO.INFO-CR ] Computer Science [cs]/Cryptography and Security [cs.CR]JammingComputerApplications_COMPUTERSINOTHERSYSTEMS02 engineering and technologyIntrusion detection systemAnomaly detection and rules-based intrusion detection techniquesIDSBlack hole (networking)Computer securitycomputer.software_genreMobile communicationUnmanned aerial vehicles[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR][INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI]0202 electrical engineering electronic engineering information engineeringFalse positive paradoxOverhead (computing)Intrusion detectionElectrical and Electronic Engineering020206 networking & telecommunicationsComputer Science ApplicationsHuman-Computer InteractionControl and Systems Engineeringintrusion detection system020201 artificial intelligence & image processingcyber-attacksIntrusion prevention systemcomputerSoftware
researchProduct

Theoretical Game Approach for Mobile Users Resource Management in a Vehicular Fog Computing Environment

2018

Vehicular Cloud Computing (VCC) is envisioned as a promising approach to increase computation capabilities of vehicle devices for emerging resource-hungry mobile applications. In this paper, we introduce the new concept of Vehicular Fog Computing (VFC). The Fog Computing (FC) paradigm evolved and is employed to enhance the quality of cloud computing services by extending it to the edge of the network using one or more collaborative end-user clients or near-user edge devices. The VFC is similar to the VCC concept but uses vehicles resources located at the edge of the network in order to serve only local on-demand mobile applications. The aim of this paper is to resolve the problem of admissi…

game theoryEdge deviceComputer science[SPI] Engineering Sciences [physics]Distributed computingmobile computingresource allocationCloud computing02 engineering and technologyFog ComputingVehicular Fog Computingdecision makingScheduling (computing)symbols.namesakeAuthor Keywords Cloud ComputingMobile applications0202 electrical engineering electronic engineering information engineeringResource managementEdge computing020203 distributed computingbusiness.industryQuality of service020208 electrical & electronic engineeringcloud computingComputational modelingAdmission controlEdge computingNash equilibriumPotential Game Theorysymbolsquality of servicevehicular ad hoc networksbusinessGamesGame theory
researchProduct

Performance Analysis of Cooperative V2V and V2I Communications Under Correlated Fading

2019

Cooperative vehicular networks will play a vital role in the coming years to implement various intelligent transportation-related applications. Both vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) communications will be needed to reliably disseminate information in a vehicular network. In this regard, a roadside unit (RSU) equipped with multiple antennas can improve the network capacity. While the traditional approaches assume antennas to experience independent fading, we consider a more practical uplink scenario where antennas at the RSU experience correlated fading. In particular, we evaluate the packet error probability for two renowned antenna correlation models, i.e., cons…

Signal Processing (eess.SP)FOS: Computer and information sciencesvehicle-to-infrastructure (V2I)Computer scienceComputer Science - Information TheoryReliability (computer networking)Real-time computingStackelberg gameComputer Science - Networking and Internet Architecturelangaton tiedonsiirto0502 economics and businessTelecommunications linkFOS: Electrical engineering electronic engineering information engineeringStackelberg competitionpeliteoriaFadingfading channelsElectrical Engineering and Systems Science - Signal ProcessingIntelligent transportation systemerror probabilitygamesNetworking and Internet Architecture (cs.NI)liikennetekniikka050210 logistics & transportationVehicular ad hoc networkreliabilityNetwork packetsignal to noise ratioInformation Theory (cs.IT)Mechanical Engineering05 social sciencesvehicle-to-vehicle (V2V)rakenteettomat verkotTransmitter power outputComputer Science Applicationsantenna correlationAutomotive Engineeringälytekniikkavehicular ad hoc networksantennas
researchProduct

Supporting scalable video transmission in MANETs through distributed admission control mechanisms

2009

Emerging multimedia applications over mobile devices are becoming very popular, especially over infrastructure wireless networks such as cellular and WLANs. However, providing this kind of services over infrastructureless networks like ad hoc networks presents many additional problems. One of these problems is how to share resources fairly among the users involved. In this article we propose a QoS framework supporting scalable video streaming in mobile ad hoc networks based on distributed admission control and video traffic awareness. Our framework promotes fairness between video flows in terms of resource consumption. It also guarantees a significant reduction of the idle times experienced…

Wireless ad hoc networkComputer scienceWireless networkbusiness.industryQuality of serviceComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSMobile computingMobile ad hoc networkAdmission control:Enginyeria de la telecomunicació::Telemàtica i xarxes d'ordinadors::Serveis telemàtics i de comunicació multimèdia [Àrees temàtiques de la UPC]Video qualityNetwork congestionVídeo -- TransmissióAd hoc networks (Computer networks) -- Access controlbusinessComputer network
researchProduct

Col : A Data Collection Protocol for Vanet

2012

International audience; In this paper, we present a protocol to collect data within a vehicular ad hoc network (VANET). In spite of the intrinsic dynamic of such network, our protocol simultaneously offers three relevant properties: (1) It allows any vehicle to collect data beyond its direct neighborhood (i.e., vehicles within direct communication range) using vehicle-to-vehicle communications only (i.e., the infrastructure is not required); (2) It tolerates possible network partitions; (3) It works on demand and stops when the data collection is achieved. To the best of our knowledge, this is the first collect protocol having these three characteristics. All that is chiefly obtained thanks…

data collection protocolVehicular communication systemsVANETCorrectnessnetwork operator antComputer sciencedata acquisitionDistributed computing[ INFO.INFO-NI ] Computer Science [cs]/Networking and Internet Architecture [cs.NI]self-stabilization area02 engineering and technologyVehicle dynamics[INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI]Transient analysis[SPI]Engineering Sciences [physics]0203 mechanical engineeringvehicular ad hoc networkvehicle to vehicle communication0202 electrical engineering electronic engineering information engineeringAlgorithm design and analysisHeuristic algorithmsCOL algorithmProtocol (object-oriented programming)ComputingMilieux_MISCELLANEOUSAirplug software distributionVehicular ad hoc networkData collectionbusiness.industryNetwork partitionnetwork partition020206 networking & telecommunications020302 automobile design & engineeringVehiclesSoftware distributionRoadsAlgorithm designvehicular ad hoc networksbusinessProtocolsComputer network
researchProduct

TCP Performance in Mobile Ad hoc Networks

2013

International audience; In this paper, we present a survey of TCP (Transmission Control Protocol) protocol for better performance in the MANET (Mobile Ad Hoc Network). After a short presentation of the main features of TCP, we give the most important problems from which TCP suffer in MANET. We present after that some approaches proposed in the literature in order to improve its performance. Our paper contains also a performance evaluation of TCP NewReno and TCP Vegas transport protocols under AODV and DSR routing protocols. The simulations are conducted under varying conditions of number of TCP connections, number of nodes and mobility.

CUBIC TCPTCP accelerationComputer scienceTCP tuning050801 communication & media studies02 engineering and technologyTCP Friendly Rate ControlTCP Westwood[INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI]0508 media and communications0202 electrical engineering electronic engineering information engineeringZeta-TCPMobile Ad hoc NetworksProblems of TCP in MANETTCP Protocolbusiness.industry05 social sciencesComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSImproving of TCP in MANET020206 networking & telecommunicationsINGENIERIA TELEMATICATCP VegasTCP global synchronizationPerformance evaluationTCP NewRenoCompound TCPbusinessComputer network
researchProduct

A Bio-Inspired Cognitive Agent for Autonomous Urban Vehicles Routing Optimization

2017

Autonomous urban vehicle prototypes are expected to be efficient even in not explicitly planned circumstances and dynamic environments. The development of autonomous vehicles for urban driving needs real-time information from vehicles and road network to optimize traffic flows. In traffic agent-based models, each vehicle is an agent, while the road network is the environment. Cognitive agents are able to reason on the perceived data, to evaluate the information obtained by reasoning, and to learn and respond, preserving their self-sufficiency, independency, self-determination, and self-reliance. In this paper, a bio-inspired cognitive agent for autonomous urban vehicles routing optimization…

Agent behaviorComputer scienceProcess (engineering)Functional featuresDistributed computingMetabolic network020206 networking & telecommunications02 engineering and technologyvehicular ad hoc networks (VANETs)Urban roadCognitive agentArtificial IntelligenceAutonomous urban vehicles routing optimization0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingRouting (electronic design automation)cellular metabolismSoftwareSimulationCell survivalcognitive agentIEEE Transactions on Cognitive and Developmental Systems
researchProduct

An accurate and efficient collaborative intrusion detection framework to secure vehicular networks

2015

Display Omitted We design and implement an accurate and lightweight intrusion detection framework, called AECFV.AECFV aims to protect the vehicular ad hoc networks (VANETs) against the most dangerous attacks that could occurred on this network.AECFV take into account the VANET's characteristics such as high node's mobility and rapid topology change.AECFV exhibits a high detection rate, low false positive rate, faster attack detection, and lower communication overhead. The advancement of wireless communication leads researchers to develop and conceive the idea of vehicular networks, also known as vehicular ad hoc networks (VANETs). Security in such network is mandatory due to a vital informa…

Vehicular ad hoc networksEngineeringVehicular ad hoc networkOverheadGeneral Computer Sciencebusiness.industryWireless ad hoc networkIntrusion detection systemNode (networking)Detection rateIntrusion detection system[SPI]Engineering Sciences [physics]Control and Systems EngineeringWirelessOverhead (computing)False positive rateElectrical and Electronic EngineeringDetection timebusinessCluster analysisComputer networkVulnerability (computing)Computers & Electrical Engineering
researchProduct

Towards an integrated approach to emergency management: interdisciplinary challenges for research and practice

2015

This article presents an interdisciplinary vision for large-scale integrated emergency management that has been inspired by the transition from platform centric to integrated operations in the oil and gas fields, which uses remote emergency control centres collaborating virtually with local responders. The article discusses some of the most salient research challenges for integrated emergency management, including the role of mobile technology, human-centred sensing, citizen participation and social media, and the socio-cultural determinants of disaster management. The purpose of this article is to frame an integrated emergency management approach that adopts a multi-disciplinary approach, …

Cultural StudiesKnowledge managementsocial media0211 other engineering and technologieslcsh:A02 engineering and technologyemergency managementIntegrated operationsArts and Humanities (miscellaneous)020204 information systems0202 electrical engineering electronic engineering information engineeringInformation systemSocial mediaMobile technologyinformation and communication technologyComputingMilieux_MISCELLANEOUSvirtual collaboration021110 strategic defence & security studiesEmergency managementdisaster vulnerabilitybusiness.industryEnvironmental resource managementsmart phonesdisaster perceptionIntegrated OperationDevelopment studiesDisasterVirtual collaborationInformation and Communications Technology[INFO.INFO-MA]Computer Science [cs]/Multiagent Systems [cs.MA]Anthropologyad hoc networksintegrated operationslcsh:General Worksbusinesshuman-centred sensingCulture Unbound: Journal of Current Cultural Research
researchProduct

A survey on pseudonym changing strategies for Vehicular Ad-Hoc Networks

2017

International audience; The initial phase of the deployment of vehicular ad-hoc networks (VANETs) has begun and many research challenges still need to be addressed. Location privacy continues to be in the top of these challenges. Indeed, both academia and industry agreed to apply the pseudonym changing approach as a solution to protect the location privacy of VANETs' users. However, due to the pseudonyms linking attack, a simple changing of pseudonym shown to be inefficient to provide the required protection. For this reason, many pseudonym changing strategies have been suggested to provide an effective pseudonym changing. Unfortunately, the development of an effective pseudonym changing st…

FOS: Computer and information sciencesComputer Science - Cryptography and SecurityComputer scienceWireless ad hoc networklocation privacy02 engineering and technologysecurityPseudonymComputer securitycomputer.software_genre[SPI]Engineering Sciences [physics]0203 mechanical engineeringpseudonym changing0202 electrical engineering electronic engineering information engineeringVANETsElectrical and Electronic EngineeringAuthenticationVehicular ad hoc networksAuthenticationComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS020206 networking & telecommunications020302 automobile design & engineeringRoadsSoftware deploymentPrivacyInitial phaseComputingMilieux_COMPUTERSANDSOCIETYSafetycomputerCryptography and Security (cs.CR)
researchProduct